Skip to content

Releases: cloudfoundry/uaa

UAA 2.7.4.13 Release Notes

15 Mar 23:00
Compare
Choose a tag to compare

This release addresses an issue with setting of session cookie with external SAML and OIDC authenitication

UAA 3.12.0 Security Release (CVE-2017-4960)

27 Feb 19:18
Compare
Choose a tag to compare

This is a security release which addresses

This release also re-introduces the JWT based Refresh Tokens. Refresh tokens are no longer opaque and revocable by default. This has been done to take care of the revocable_tokens table filling up with large deployments of UAA.

The format of the refresh token can now be set at an Identity Zone level via the API and can be boot strapped from the UAA.yml file for the default zone.

#    refresh:
#      unique: false ("If true, uaa will only issue one refresh token per client_id/user_id combination")
#      format: jwt 

UAA 3.9.8 - Security Release (CVE-2017-4960)

27 Feb 18:43
Compare
Choose a tag to compare

UAA 3.11.0 Release

24 Feb 01:47
Compare
Choose a tag to compare
UAA 3.11.0 Release Pre-release
Pre-release
3.11.0 release of the UAA

UAA 3.9.7 Release

24 Feb 01:48
Compare
Choose a tag to compare
UAA 3.9.7 Release Pre-release
Pre-release
3.9.7 release of the UAA

3.9.6

15 Mar 23:29
Compare
Choose a tag to compare
3.9.6 Pre-release
Pre-release
3.9.6 release of the UAA

UAA 3.9.5 Release

15 Mar 22:49
Compare
Choose a tag to compare

This release re-introduces the JWT based Refresh Tokens. Refresh tokens are no longer opaque and revocable by default. This has been done to take care of the revocable_tokens table filling up with large deployments of UAA.

The format of the refresh token can now be set at an Identity Zone level via the API and can be boot strapped from the UAA.yml file for the default zone.

#    refresh:
#      unique: false ("If true, uaa will only issue one refresh token per client_id/user_id combination")
#      format: jwt 

UAA 3.9.4 Release

15 Mar 22:45
Compare
Choose a tag to compare

Breaking Changes

With this release we have redacted the SAML Service Provider Key and OAuth Token Signing Keys from the Identity Zone GET API Response. The POST and PUT API's functionality stays intact in terms of allowing Zone Administrators to create and update SAML and OAuth Token Keys as part of the Identity Zone configuration. Please refer to the API docs for more details.

New Features

Bug Fixes

UAA 3.6.6 Release

15 Mar 22:41
Compare
Choose a tag to compare

Breaking Changes

With this release we have redacted the SAML Service Provider Key and OAuth Token Signing Keys from the Identity Zone GET API Response. The POST and PUT API's functionality stays intact in terms of allowing Zone Administrators to create and update SAML and OAuth Token Keys as part of the Identity Zone configuration. Please refer to the API docs for more details.

New Features

Bug Fixes

UAA 3.10.0 Release

01 Feb 22:09
Compare
Choose a tag to compare

Major Features

External User Claims via UserInfo Endpoint

This feature enables User Attributes (including custom attributes) and Group Memberships from LDAP, SAML and OpenID Connect providers to be exposed via the UserInfo endpoint of UAA in addition to propagating them via OpenID Connect id_token. This is an optional feature per external identity provider and is turned on by setting the config.storeCustomAttributes flag in the Identity Provider json. The token must contain user_attributes and/or roles scopes for retrieving the custom attributes and roles from the /userinfo endpoint.

Force User Password Change for UAA Internal Users

This feature allows the administrator to force all users to change their password at next login time. This can be enforced on an individual user basis. This feature is multi-tenant and can be enabled per Identity Zone.

SAML Bearer Token support

This feature enables SAML assertions to be exchanged for access tokens. This feature has been contributed by SAP. The documentation can be found here.

SQL Server Support

In addition to PostGres and MySQL , UAA now supports SQL Server as a backend. This feature has been contributed by Microsoft.

Breaking Changes

With this release we have redacted the SAML Service Provider Key and OAuth Token Signing Keys from the Identity Zone GET API Response. The POST and PUT API's functionality stays intact in terms of allowing Zone Administrators to create and update SAML and OAuth Token Keys as part of the Identity Zone configuration. Please refer to the API docs for more details.

Minor Features

Bug Fixes